1-out-of-L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption
スポンサーリンク
概要
- 論文の詳細を見る
In this paper, we propose an e-voting system with a ballot-cancellation property. The existed voting systems had overlooked about the ballot-cancellation scheme. There is the reason that the ballot is cancelled according to an election law. For example, when a right of casting the ballot is Election Day, the ballot-cancellation scheme is needed for an absentee voter. Usually, the absentee voter casts a ballot before Election Day. If the absentee voters which cast a ballot die or lost the right of casting the ballot before Election day, the ballots of absentee voters should be cancelled according to the election law. When the ballot is cancelled, the ballot-cancellation scheme should satisfy privacy and verifiability. Cramer et al. proposed a very efficient multi-authority election schemes which guarantee privacy, robustness, and universal verifiability at Eurocrypt'97. Yamaguchi et al. pointed out that the e-voting system based on multi-party has much computing resources, and proposed the two-centered e-voting protocol based on r-th residue encryption and RSA cryptosystem. However, their system is just yes-no voting. First, we propose a 1-out-of-L e-voting based on Yamaguchi et al.'s scheme. Second, we extend this 1-out-of-L e-voting to the ballot-cancellation scheme.
- 社団法人電子情報通信学会の論文
- 2005-07-15
著者
-
Sakurai Kouichi
Kyushu Univ. Fukuoka Jpn
-
Sakurai Kouichi
Faculty Of Information Science And Electrical Engineering Kyushu University
-
HER Yong
Graduate School of Information Science and Electrical Engineering, Kyushu University
-
IMAMOTO Kenji
Graduate School of Information Science and Electrical Engineering, Kyushu University
-
Her Yong
Graduate School Of Information Science And Electrical Engineering Kyushu University
-
Imamoto Kenji
Graduate School Of Information Science And Electrical Engineering Kyushu University
-
Sakurai Kouichi
Faculty Of Computer Science And Communication Engineering Kyushu University
-
Her Yong-Sork
Graduate School of Information Science and Electrical Engineering, Kyushu University
関連論文
- A Collaborative Role-Based Access Control for Trusted Operating Systems in Distributed Environment(Application)(Cryptography and Information Security)
- A study on worms using search engine to spread (情報通信システムセキュリティ)
- Usage Control Model and Architecture for Data Confidentiality in a Database Service Provider(Network Security)
- FOREWORD
- 1-out-of-L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption
- A-7-21 Security Policy Pre-evaluation towards Risk Analysis
- FOREWORD
- Securing provenance by distributing the provenance storage (マルチメディア通信と分散処理・コンピュータセキュリティ)
- Use of Montgomery Trick in Precomputation of Multi-Scalar Multiplication in Elliptic Curve Cryptosystems(Special Section on Cryptography and Information Security)
- Special Section on Cryptography and Information Security
- PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis(Symmetric Key Cryptography)(Cryptography and Information Security)
- 1-out-of-L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption
- A Simple Power Attack on a Randomized Addition-Subtraction Chains Method for Elliptic Curve Cryptosystems
- Analysis and Design of SHA-V and RIPEMD-V with Variable Output-Length
- Simple Power Analysis on Fast Modular Reduction with Generalized Mersenne Prime for Elliptic Curve Cryptosystems(Side Channel Analysis, Cryptography and Information Security)
- Trends and Security Issues for Contactless Smart Cards
- Enhancing Airport Access Control Security with Multiple Biometrics Contactless Smart Card (特集:新たな脅威に立ち向かうコンピュータセキュリティ技術)
- An Efficient Representation of Scalars for Simultaneous Elliptic Scalar Multiplication
- Optimization of Group Key Management Structure with a Client Join-Leave Mechanism
- Fast Implementation of KCipher-2 for Software and Hardware
- Usage Control Model and Architecture for Data Confidentiality in a Database Service Provider
- Usage Control Model and Architecture for Data Confidentiality in a Database Service Provider
- Optimization of Group Key Management Structure with a Client Join-Leave Mechanism